General

  • Target

    0bd06acb794c55fc9ce9a6119a211cbc4b3bfeafea41f73c39cefb8b2fa39657

  • Size

    92KB

  • Sample

    220212-jx7zhabdhq

  • MD5

    c3550f05cfe341a9985707eb759b5aeb

  • SHA1

    a80d6fea0eef9db322f236b30142b7a44b47f974

  • SHA256

    0bd06acb794c55fc9ce9a6119a211cbc4b3bfeafea41f73c39cefb8b2fa39657

  • SHA512

    785255ad33725beb305ae5414e039d7ab99c57b3027243de3331ba32dea66b8a2e1b5e107b0be92a599dc160819d00ec3a6f71d9915c6efb3bb990791442b96e

Malware Config

Targets

    • Target

      0bd06acb794c55fc9ce9a6119a211cbc4b3bfeafea41f73c39cefb8b2fa39657

    • Size

      92KB

    • MD5

      c3550f05cfe341a9985707eb759b5aeb

    • SHA1

      a80d6fea0eef9db322f236b30142b7a44b47f974

    • SHA256

      0bd06acb794c55fc9ce9a6119a211cbc4b3bfeafea41f73c39cefb8b2fa39657

    • SHA512

      785255ad33725beb305ae5414e039d7ab99c57b3027243de3331ba32dea66b8a2e1b5e107b0be92a599dc160819d00ec3a6f71d9915c6efb3bb990791442b96e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks